Search Results - (( code application window algorithm ) OR ( java applications usage algorithm ))
Search alternatives:
- application window »
- applications usage »
- java applications »
- code application »
- window algorithm »
- usage algorithm »
-
1
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…The algorithm is based on 8-connected 3x3 windows of Freeman chain code. …”
Get full text
Get full text
Get full text
Article -
2
Line clipping based on parallelism approach and midpoint intersection
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
3
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
PCB defect detection system using run-length encoding
Published 2017Get full text
Get full text
Student Project -
5
-
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat
Published 1996“…These algorithm are written in C code using BORLAND C++ in Windows environment , improvise the poor image to become a clear image using enhancement techniques. …”
Get full text
Get full text
Thesis -
8
-
9
Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels
Published 2021“…This paper investigates the applicability of a proposed digital image algorithm for filling cracks in digitized paintings. …”
Get full text
Get full text
Get full text
Article -
10
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…The experimental result shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
FPGA Implementation of Emergency Door Car Entry System
Published 2008“…FPGA board is a board that can be programmed using source code to run the application that has been downloaded into it. …”
Get full text
Learning Object -
12
A new domain decomposition FDTD technique for simulating electromagnetic penetration into buildings
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
On-chip communication system modeling approach for reability analysis focusing on functional failures
Published 2012“…The algorithms were verified and the resultsshow that minimum accuracy of 96% is maintained by applying the proposed crosstalk modeling approach while the number of required simulations is reduced by at least factor of 59% for modeling window sizes bigger than 3. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
-
18
-
19
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
Get full text
Get full text
Thesis
